Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create How-to-perform-threat-assessments-the-right-way.md #2786

Merged
merged 1 commit into from
Nov 26, 2023
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
---
title : "How to perform threat assessments, the right way!"
track : Threat Modeling
project : Threat Modeling
topics :
featured :
event : mini-summit
when_year : 2024
when_month : Jan
when_day : Mon
when_time : WS-18-19
hey_summit :
banner :
session_slack:
#status :
description :
organizers :
- Saber Ferjani
youtube_link :
zoom_link :
---

## About the session:
Threat actors continue to bypass all kind of defensive and detective measures. Nevertheless, prevention remains the most cost-effective method to keep threats away. In particular, most organizations still prefer to invest in a variety of less effective tools. The question is: Are you relying on the right metric, to assess the security posture of your service? If standard metrics such as CVSS is not accurate enough, then what kind of metric should you consider for vulnerabilities without CVE, such as those related to your own business logic? Let's dive deep into most common mistakes by software architects and security professionals alike, and how to optimize the time spent on developing secure products to get the best out of your entire team.

### Publication:
https://www.youtube.com/watch?v=HoJJ37bneJs (Lisbon, Portugal - March 2022)